Static task
static1
Behavioral task
behavioral1
Sample
14f326435d434150063b3823d27f926b24ffbd9cb146032322d452374369e1c6.exe
Resource
win7-20220812-en
General
-
Target
14f326435d434150063b3823d27f926b24ffbd9cb146032322d452374369e1c6
-
Size
765KB
-
MD5
5470538b96933450a6f4e81197db49b0
-
SHA1
e182e4e6d344066ad44f427ae304651eaac94fc9
-
SHA256
14f326435d434150063b3823d27f926b24ffbd9cb146032322d452374369e1c6
-
SHA512
00c9ce7772ecadccc047bce291842da2b26dca4f23ee2aa23cbe4fd936e055fe84dacc140a4a9a9e959a1c00ec18c4323acee3d6ec1c1f8eb1b33e0577511df7
-
SSDEEP
12288:R0PDPmj2m5rUfqHv53cExGifB85ELNeyaYXn5mXmYLv5J+cCWtkqSRnU7noAFRl1:ReS2sQiHv5sExhfB85ELNeNYXIXmYLv9
Malware Config
Signatures
Files
-
14f326435d434150063b3823d27f926b24ffbd9cb146032322d452374369e1c6.exe windows x86
183bd4fad5e59a80b92c89354d994285
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
CreateMutexW
FindFirstFileW
SetFilePointer
WritePrivateProfileStructA
GetLocaleInfoA
VirtualQuery
FreeLibrary
InterlockedIncrement
SystemTimeToFileTime
MoveFileExW
InterlockedDecrement
GetCurrentProcess
CreateDirectoryW
WaitForSingleObject
InterlockedCompareExchange
OutputDebugStringW
IsBadReadPtr
GetWindowsDirectoryA
WriteFile
InitializeCriticalSection
GetSystemDirectoryW
WideCharToMultiByte
LoadLibraryW
Sleep
GetVersionExW
LeaveCriticalSection
GetFileAttributesW
ReadFile
GetModuleFileNameW
CreateFileW
GetACP
MultiByteToWideChar
GetLastError
GetCurrentDirectoryW
GetThreadLocale
GetProcAddress
EnterCriticalSection
FindClose
GetPrivateProfileStringA
GetLocalTime
WritePrivateProfileStringA
RemoveDirectoryW
GetPrivateProfileStructA
FindNextFileW
DeleteCriticalSection
GetShortPathNameW
GetCurrentThreadId
ReleaseMutex
CloseHandle
DeleteFileW
GetCurrentProcessId
SetFileAttributesW
SetWaitableTimer
ResetEvent
LocalAlloc
CreateEventW
GlobalGetAtomNameW
CreateWaitableTimerW
GetPrivateProfileSectionW
LocalFree
CompareStringW
FlushFileBuffers
WriteConsoleW
SetEnvironmentVariableA
SetStdHandle
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedExchange
LoadLibraryA
RaiseException
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
ExitProcess
GetStdHandle
GetLocaleInfoW
GetTimeZoneInformation
user32
DispatchMessageW
FindWindowExW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjectsEx
SendMessageW
GetPropW
oleaut32
SysFreeString
SysAllocString
shlwapi
PathIsRelativeW
PathRemoveFileSpecW
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 508KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE